1 / 15

Virtualizing the Data Plane Through Source Code Merging

This paper discusses a software architecture for building configurable routers using source code merging. It explores lightweight virtualization techniques and provides a prototype implementation using Click, Linux-VServer, and NetFPGA. The paper also addresses issues related to performance isolation, namespace isolation, and resource isolation.

Download Presentation

Virtualizing the Data Plane Through Source Code Merging

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Virtualizing the Data Plane Through Source Code Merging Eric Keller, Evan Green Princeton University PRESTO 2008 8/22/08

  2. Zooming In On a Virtual Router • Custom functionality • Custom user environment on each node (for controlling virtual router) • Specify single node’s packet handling • Isolated from others sharing same node • Allocated share of resources (e.g. CPU, memory, bandwidth) • Protected from faults in others (e.g. another virtual router crashing) • Highest performance possible User Control Environment Config/Query interface A1 A2 A3 From devices To devices A4 A5

  3. General Virtualization • Isolation: Namespace, Resource, Performance • Full/Para Virtualization • Separate operating system • By emulating underlying hardware • Each OS has own network stack • Container Virtualization • Separate data structures • By modifying kernel • Shared network stack, each container can configure

  4. Packet Processing Configurability • Goal: run custom code for packet processing • Requires: isolation • Namespace, resource, performance • Could run each instance of custom code in a VM • Isolation provided by virtual machine • Lighter weight solution • Provide appearance of multiple instances • While, still providing isolation Click as platform for this lightweight solution

  5. FromDevice(eth0) Counter Discard Click Background: Overview • Software architecture for building configurable routers • Widely used – commercially and in research • Easy to use, flexible, high performance • Routers assembled from packet processing modules (Elements) • Simple and Complex • Processing specified as directed graph • Includes a scheduler • Schedules tasks (a series of elements)

  6. Lightweight Virtualization • Source Code Merging: Combine graphs • Each virtual router specifies custom graph • Can target hardware or software • Add extra packet processing (e.g. mux/demux) • Needed to direct packets to the correct graph • Add resource accounting Graph 1 Master graph combine Graph 2 Master Graph Graph 1 Output port Input port Graph 2

  7. Prototype Implementation:Linux-VServer + Click + NetFPGA (future) Coordinating Process Install/ Query Install/ Query Install/ Query Click Click on NetFPGA

  8. Resource Accounting with VServer • Purpose of Resource Accounting • Provides performance isolation between virtual routers • VServer’s Token Bucket Extension to Linux Scheduler • Controls eligibility of processes/threads to run • Integration with Click • Unified accounting for packet processing and control • Each Click configuration assigned to a thread • Each thread associated with a VServer context • ~10% overhead of 10 virtual routers vs unshared node

  9. Isolation Properties • Performance Isolation • Associate each graph with virtual container • Assume library of “safe” elements that execute within a bounded amount of time • Namespace Isolation • Coordinating process statically renames • Resource Isolation • Memory: assume library of “safe” elements that do not access memory outside of element • Devices: Coordinating process adds mux/demuxing elements • Next: examine relaxing to allow custom elements

  10. Problem 1: Unyielding Threads • Linux kernel threads are cooperative (i.e. must yield) • Token scheduler controls when eligible to start • Single long task can have short term disruptions • Affecting delay and jitter on other virtual networks • Token bucket does not go negative • Long term, a virtual network can get more than its share Tokens added (rate A) Size of Bucket (S) Min tokens to exec (M) Tokens consumed (1 per scheduler tick)

  11. Problem 1: Unyielding Threads (soln.) • Determine graph’s execution time • Standard N port router example - ~ 5400 cycles (1.8us) • RadixIPLookup (167k entries) - ~1000 cycles • Option 1: Break up graph • Option 2: Execute inside of container elem1 elem2 elem3 elem1 elem2 To User From Kern elem3

  12. Problem 2: Custom Elements in C++ • Elements have access to global state • Kernel state/functions • Click global state • Could… (and we did) • Pre-compile in user mode • Pre-compile with restricted header files • Not perfect: • With C++, you can manipulate pointers • Instead, custom elements are unknown (“unsafe”) • For absolute safety, execute in container

  13. Future Work • Safety • Modify source code to add checks (e.g. CCured) • Run-time monitoring • Explore alternative tradeoff points • Add support for specialized devices (FPGAs) • Click to FPGA • Partitioning graph across FPGA and Software • Specification of elements • Language to target either HW or SW

  14. Conclusion • Goal: Enable custom data planes per virtual network • Built prototype system for virtual Click in kernel • Merging Click graphs of different virtual routers • Adding elements to mux/demux packet to correct graph • Unified resource accounting with Linux-VServer • Discussed issues of safety • Performance Isolation: Unyielding threads • Resource Isolation: Pointers • Using source code • Enables a lightweight virtualization mechanism • Opens up compile time solutions to safety

  15. Questions

More Related